Full Publication List
2024
Ceno: Non-uniform, Segment and Parallel Zero-knowledge Virtual Machine
Journal of Cryptology
Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field
Designs, Codes and Cryptography
Jolt-b: recursion friendly Jolt with basefold commitment
2023
HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates
Eurocrypt 2023
VERI-ZEXE: Decentralized Private Computation with Universal Setup
USENIX Security 2023
2022
An SVP attack on Vortex
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain
ESORICS 2022
2021
Manta: a Plug and Play Private DeFi Stack
Check out the Manta Project that spined off from this paper.
Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand
Financial Cryptography 2021
TensorCrypto: High Throughput Acceleration of Lattice-based Cryptography Using Tensor Core on GPU
Pre-print
2020
Pointproofs: Aggregating Proofs for Multiple Vector Commitments
ACM CCS 2020
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors
PKC 2020
Modular Lattice Signatures, revisited
Design, Codes and Cryptography
1st round, NIST post-quantum cryptography standardization process
2019
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications
Crypto 2019
Ring Signatures based on Middle-Product Learning with Errors Problems
Africacrypt 2019
Round5: Compact and Fast Post-Quantum Public-Key Encryption
PQCrypto 2019
2nd round, NIST post-quantum cryptography standardization process
2018
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus
First prize of Chinese post-quantum cryptography competition
2nd round, NIST post-quantum cryptography standardization process
On the Hardness of the Computational Ring-LWR Problem and its Applications
Asiacrypt 2018
A signature scheme from the finite field isomorphism problem
MathCrypt 2018
Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction
ACISP 2018
Optimizing polynomial convolution for NTRUEncrypt
IEEE Transaction on Computers
2017 and Earlier
A signature scheme from Learning with Truncation
Anonymous Announcement System (AAS) for Electric Vehicle in VANETs
The Computer Journal
Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world
PoPETs 2016
LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE scheme
Design, Codes and Cryptography
DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation
Fully Homomorphic Encryption Using Hidden Ideal Lattice
IEEE Transaction on Information Forensics and Security
Adaptive Precision Floating Point LLL
ACISP 2013
On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers
ISPEC 2012
Lattice Reduction for Modular Knapsack
SAC 2012
Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes
ICISC 2011